Kubernetes Network Policy Manager

Centrally Manage all the Network Policies for your Kubernetes Infrastructure

Centralized management and visibility into your pod and namespace communication to ensure isolation boundaries and reduce the lateral attack surface fleet-wide, powered by Cilium.

Kubernetes Network Policy Automation, Standardization, and Governance Across Your Fleet of Clusters and Applications, Powered by Cilium

With Rafay, platform teams can configure enterprise-grade Kubernetes network isolation policies and enable developers to gain visibility into traffic flows.

Satisfy security and organizational compliance requirements for isolation and network access

Enable development teams to configure policies for namespace resources and reduce time to resolve issues

Prevent lateral movement and reduce attack surface within and across a fleet of clusters

Visibility Into Real-Time and Historical Network Traffic Flows For Developer Self-Service Based on Assigned Role

Rafay provides real-time network visibility and stores historical traffic flows for your specific namespaces and pods based on role. Enable developers to be self-reliant in debugging network communication flows for their applications while ensuring that platform teams are providing secure identity-based network visibility access based on user and role.

https://rafay.co/wp-content/uploads/2022/10/1-1.png

Isolate Communication Between Applications and Namespaces In Both Shared and Dedicated Cluster Environments

In order to reduce the lateral attack surface, Rafay allows you to build policies that can control ingress/egress traffic to clusters and isolate namespaces to implement a zero-trust model into your Kubernetes environments.

https://rafay.co/wp-content/uploads/2022/10/Screenshot-2-Cluster-Namespace-Policies-1-1.png

Enforce Network Policy Standards Cluster-Wide and at an Individual Namespace Level

In order to meet security and compliance requirements, it is critical for platform teams to enforce standards that can be met across the organization. For example, platform teams can enforce cluster-wide policies, such as default deny rules or namespace isolation, while leveraging RBAC to enable developers to apply policy rules for their applications that specify the traffic that is allowed to/from pods or namespaces.

https://rafay.co/wp-content/uploads/2022/10/Screenshot-3-Namespace-Policy-Placement-1-1.png

See the Network Policy Manager in Action!

 

 

Network Policy Management Service FAQs

What is the value with selecting Rafay over using open-source DIY tooling to manage and enforce network policies?

Rafay Network Policy Management service is fully integrated with Rafay’s platform. Not only does this solve for network security, but other parts of Kubernetes governance, including RBAC, deployment pipelines and infrastructure templates. Additionally, you can increase the reliability and reduce the operational cost with automated deployments, upgrades, and ongoing lifecycle management.

What specific use cases can be solved specifically by network policies?

Network policies can be used for workload protection to establish zero-trust and ensure that your applications are only communicating with what is required. In addition, network policies are great for running shared clusters. By creating namespace isolation rules, platform teams are presented with a lightweight option to segment different users and applications from each other during actual runtime.

What is the difference between OPA Gatekeeper and network policies?

OPA Gatekeeper is used as a validation engine to ensure that clusters and applications follow a standard protocol tied to configuration. In addition, this can be extended to ensure for example that all clusters have a default network policy.

Network policies meanwhile are used to protect workloads and isolate namespaces during runtime, very much like a firewall. An admin or developer creates network policies that allow/deny communication to other entities.

Download the White Paper

Best Practices for Securing Kubernetes

How to Apply Zero-Trust Principles to Secure Access to Kubernetes

"Easily operate and rapidly deploy applications anywhere across multi-cloud and edge environments."

Aamir Hussain

SVP Chief Product Officer, Verizon Business

"Rafay stood out from the crowd with their deep integration with Amazon EKS."

Jayant Thakre

VP Products

"The big draw was that you could centralize the lifecycle management & operations."

Beth Cohen

Cloud Technology Strategist, Verizon Business

"Rafay’s unified view for Kubernetes Operations & deep DevOps expertise has allowed us to significantly increase development velocity."

Alec Rooney

CTO

Blogs from the Kubernetes Current

Image for How to Automate Upgrades to Amazon EKS 1.24 Stargazer

How to Automate Upgrades to Amazon EKS 1.24 Stargazer

September 14, 2023 / by Anirban Chatterjee

EKS Version Released End of Support 1.28 September 2023 November 2024 1.27 May 2023 July 2024 1.26 April 2023 June 2024 1.25 February 2023 May 2024 1.24 November 2022 January 31, 2024 You are here → 1.23 August 2022 October… Read More

Image for Rafay Systems Named as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Container Management

Rafay Systems Named as a Cool Vendor in the 2023 Gartner® Cool Vendors™ in Container Management

September 10, 2023 / by Haseeb Budhani

Recently, Gartner named Rafay a “Cool Vendor” in the 2023 Gartner Cool Vendors for Container Management report. Team Rafay is extremely pleased and elated for having received this recognition. Gartner research revealed that “by 2027, more than 90% of G2000… Read More

Image for Understanding Kubernetes Access Management

Understanding Kubernetes Access Management

August 28, 2023 / by Sean Wilcox

Access management in Kubernetes revolves around controlling who can interact with the cluster and what actions they can perform. This extends to users, services, applications, and even processes within the cluster. Effective access management fosters a secure environment while enabling… Read More